Pheap 2.0 allows remote attackers to bypass authentication by setting a pheap_login cookie value to the administrator's username, which can be used to (1) obtain sensitive information, including the administrator password, via settings.php or (2) upload and execute arbitrary PHP code via an update_doc action in edit.php.
References
Configurations
History
21 Nov 2024, 00:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/36737 - | |
References | () http://secunia.com/advisories/25460 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/34592 - | |
References | () https://www.exploit-db.com/exploits/4006 - |
Information
Published : 2007-06-01 10:30
Updated : 2025-04-09 00:30
NVD link : CVE-2007-2985
Mitre link : CVE-2007-2985
CVE.ORG link : CVE-2007-2985
JSON object : View
Products Affected
pheap
- pheap
CWE
CWE-264
Permissions, Privileges, and Access Controls